Tractors Stolen in Ukraine By Russian Troops Disabled Remotely

Share post:

Tractor manufacturer John Deere has deactivated tractors stolen by Russian troops in the southeastern Ukrainian city of Melitopol.

The tractor used the Connected Support Program, a strategy that many believed was put in place to prevent tractor owners from repairing their tractors to stop the theft by Russian troops.

The manufacturer was able to deactivate the units with a remote locking function that has a GPS receiver. The GPS receiver allows the user to know his location at any time. The system also has a software that allows the user to remotely correct mechanical faults, just like a computer.

In addition to tractors, Russian troops also stole grain and harvesting machinery that they sent to Chechnya.

According to the anonymous CNN source, the Russian soldiers are looking for a way to reactivate the equipment so that they can use it. If they cannot reactivate it, they could end up selling the machine as spare parts.

The war in Ukraine is contributing to the shortage of maize, which Ukraine is known to produce in large quantities. Ukraine is the fourth largest exporter of maize in the world, with annual sales of over 44 million tonnes in recent years.

The sources for this piece include an article in Entrepreneur.

SUBSCRIBE NOW

Related articles

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Massive Credential Stuffing attack exploits home devices

Okta, a leading authentication service, is raising alarms over a massive credential-stuffing attack that cleverly disguises fraudulent login...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways